Payment card scams used to be surprisingly simple, because the cards themselves had few or no technological protections to stop them being copied and cloned.
Indeed, until comparatively recently, almost all payment cards had the card number, expiry date and account holder’s name not merely printed on the front of the card but embossed into the plastic to create raised characters.
This means that transactions could be processed using a simple, non-computerized, entirely offline payment device known colloquially as a zip-zap machine, which ran a roller over the card to take an impression on two special sheets of carbon-copy paper.
One copy was the customer’s own receipt; the other was the proof of transaction, later submitted by the merchant to receive payment.
Both slips contained a full copy of those embossed characters – indeed, the merchant wouldn’t and couldn’t get paid if their copy was indistinct.
Card-present payments where the merchant had a working internet connection were handled by a simple magnetic stripe reader, using the same sort of technology as an old-school cassette player to read the data off the magstripe on the back of the card, where it is stored unencrypted and contains the same information as the front of the card.
These readers (which you can still easily buy online for just a few dollars) are tiny and unsophisticated, typically pretending to be a keyboard when they’re hooked up to a computer, so the data they acquire from a card can be read in by any application without special programming or hardware drivers.
By the 2000s, criminals had perfected the construction of so-called skimming devices, often built out of a $10 magstripe reading head and a jerry-rigged $15 mobile phone, which they would attach to legitimate card readers at ATMs, gas stations and even in unobservant (or corrupt) stores, hidden inside, underneath or alongside legitimate payment processing devices.
Skimmers would copy the card’s data at the same time that the genuine transaction was being processed, dump it into an app on the hidden mobile phone, and either store it onto a memory card for recovery a few days later, or upload it via the mobile network or Bluetooth to a waiting device operated by the criminal gang.
The only additional protection implemented for payments made by zip-zap machines or card-swipe terminals was a very crude form of multi-factor authentication (MFA), where the merchant was expected to obtain the customer’s signature on the payment slip (as seen in the image above), and to “verify it by eye” against the signature on the back of the card.
But signature verification was close to useless, given that few merchants bothered to check carefully, and many didn’t even turn the card over to check at all.
For card-not-present transactions, such as online payments or orders over the phone, basic MFA “protection” was – and still is, to this day – limited to a short secret code, three or four digits long, typically printed on the back of the card and not recorded anywhere else.
This secret code, often referred to as the CVV, or card verification value, generally isn’t printed or embossed on the front of the card, is never coded into the magstripe data, and isn’t stored in the chip even on modern chip-based cards.
The idea is that with skimmed magstripe data alone, there isn’t enough information available for criminals to use your card online, because they don’t know the CVV.
To bypass this problem, and to enable large-scale online card fraud, cybercriminals devised, developed and have continually been tweaking and improving, the crime known as phishing.
Criminals who can lure you to a bogus but genuine-looking website, for example by enticing you with a special offer or insisting that you need to make an important but often modest-sounding payment such as a parking fine or a delivery charge, can obtain full card data, including the vital CVV, simply by persuading you to type it in on their website instead of the real thing.
Sometimes, the “payment” they request is so modest, such as $0.99 to reschedule a home delivery, that the risk of being defrauded seems low enough to be worth taking.
Except, of course, that the criminals aren’t after 99 cents right now, but after your card data to sell on (or to abuse themselves) for much bigger fraudulent purchases in the future.
Not all payment-card cybercriminals are focused on fraudulent online activities.
Some have bigger goals, such as using other gang members to make fraudulent card-present transactions, perhaps in other countries, to purchase valuable items that they can carry away at once.
These are often luxury items such as jewelry, or expensive household appliances such as top-end TVs.
The idea is that although this greatly increases the risk of being caught due to showing up in person, the core criminals aren’t the ones directly exposed to arrest because they use subordinate criminals to make the purchases.
If the transaction is approved, and the goods handed over, there’s no chance of a delivery falling through due to subsequent fraud detection tools kicking in, and no need for a delivery address that could end up being staked out or raided.
In years gone by, criminal gangs could readily purchase fake card blanks from underground forums.
These blanks looked realistics enough to pass muster with most merchants.
By encoding stolen card data on the magstripe to match the name embossed on the bogus card, or even by writing data that didn’t match given that merchants tended not to notice, and by signing the back of the fake card themselves, the criminals could go on spending sprees with instant results.
Trusted members of the criminal gang would typically drive a group of “affiliates”, who were often targeted and recruited because they had visa problems or couldn’t get legitimate employment, from store to store at busy shopping times to make all manner of high-value purchases.
This sort of crime was made much more difficult following the introduction of chip-based credit cards, which can’t simply be cloned like a magstripe card.
The chip itself is a critical cryptographic component in the payment process, using secret cryptographic keys that are written into the chip by the issuer, but that are as good as impossible to read out thereafter, thanks to the chip’s tamper-resistant design.
In countries that strictly implement Chip-and-PIN payments, where high-value card-present transactions also require the payer to input the card’s PIN, with a strict limit of three incorrect entries before the card locks itself up, even stolen cards that the criminals have in their hands are difficult to abuse in face-to-face purchases.
And in a trend that might seem to be putting the lid on “stolen card” transactions for ever, many people are now loading their payment card details into their Apple or Android phones, and using Apple Pay or Google Pay to complete their point-of-sale payments.
This means that they no longer need to carry their cards with them at all, but can leave them locked away at home.
Merchants like these new payment systems because they don’t require new point-of-sale hardware, given that your phone uses the same NFC (near-field communication) wireless technology and protocol as the payment cards it supersedes.
These phone-based payments are in some ways safer than using cards directly, given that:
At this point, it certainly sounds as though card-present fraud is much easier to control, and much riskier for criminals to pull off, than it was in the days before chip-based payment cards or phone-based secure wallet apps.
This seems especially true for high-value items that a store is willing to let the purchaser walk out with right away, such as expensive jewelry, high-end TVs, or the latest-model laptops and mobile phones.
But the truth is more complicated than that, and we therefore recommend all of these steps:
Learn more about our mobile security solution that goes beyond traditional MDM (mobile device management) software, and offers active on-device protection that’s more like the EDR (endpoint detection and response) tools you are used to on laptops, desktops and servers:
Paul Ducklin is a respected expert with more than 30 years of experience as a programmer, reverser, researcher and educator in the cybersecurity industry. Duck, as he is known, is also a globally respected writer, presenter and podcaster with an unmatched knack for explaining even the most complex technical issues in plain English. Read, learn, enjoy!
Featured image of old cash register by Alvaro Reyes via Unsplash.
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.